Stealing the Network: How to Own an Identity The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the...
Perl Hacks : Tips & Tools for Programming, Debugging, and Surviving With more than a million dedicated programmers, Perl has proven to be
the best computing language for the latest trends in computing and
business. While other languages have stagnated, Perl remains fresh
thanks to its community-based development model, which encourages the
sharing of information among users. This tradition...
The Design Analysis Handbook: A Practical Guide to Design Validation If you need to create reliable, cost-effective, optimized designs, The Design Analysis Handbook provides a practical framework for integrating quality into the design process from start to finish. The methodology used is called Worst Case Analysis Plus (WCA+), a design-validation tool that demands thoroughness and analytical thinking by the user.... The Government Machine: A Revolutionary History of the Computer Sitting in the reading rooms of the Public Record Office in London, a historian is in the center of a museum of organization. Copies of the catalogue to the museum fill several walls (although these are now complemented by online versions). The catalogue lists are dominated by references to objects of one kind: the file. The file has in its...
|Result Page: 6 5 4 3 2 1 |